Subscribe to the latest research through IGI Global's new InfoSci-OnDemand Plus

InfoSci®-OnDemand Plus, a subscription-based service, provides researchers the ability to access full-text content from over 100,000 peer-reviewed book chapters and 26,000+ scholarly journal articles covering 11 core subjects. Users can select articles or chapters that meet their interests and gain access to the full content permanently in their personal online InfoSci-OnDemand Plus library.

When ordering directly through IGI Global's Online Bookstore, receive the complimentary e-books for the first, second, and third editions with the purchase of the Encyclopedia of Information Science and Technology, Fourth Edition e-book.

InfoSci®-Journals Annual Subscription Price for New Customers: As Low As US$ 5,100

This collection of over 175 e-journals offers unlimited access to highly-cited, forward-thinking content in full-text PDF and HTML with no DRM. There are no platform or maintenance fees and a guarantee of no more than 5% increase annually.

Bookstore Search

As the changing demographics of the workplace influence how organizations operate, the need to reexamine relationships between these demographic variables and their effect on the organization continues. This study provides an empirical examination of the effect of two demographic variables, age and...

As business models evolve to integrate technology with organizational strategy and marketing, the application of Web technology to facilitate end-user interactions, or what we call Web-enabled interactivity, has become increasingly important to customer relationships. This article develops and...

It has been argued that simple conceptualizations of usage are inadequate for understanding and studying the use of complex information technologies. In this article, we contend that quality of use, instead of the dichotomy of use vs. nonuse, is appropriate for understanding the extent to which a...

Information security is usually considered a technical discipline with much attention being focused on topics such as encryption, hacking, break-ins, and credit card theft. Security products such as anti-virus programs and personal firewall software, are now available for end-users to install on their...

This study investigates the effectiveness of online task support (the wizard type in particular) relative to instructor-led training, and explores the underlying cognitive process in terms of the development of mental models. Ninety-two novice users of Microsoft Access were either trained by an...

The growing globalization of business is making face-to-face communications, decision-making, and negotiations more the exception than the rule. Internet communication in text-only, audio, and video form are all becoming feasible methods of communication between distantly located parties. However, in...

In its formative years and during the 1990s, 1Global Energy PLC (GE) went through a series of structural changes precipitated by the deregulation of the electricity industry in the UK. The severity of these changes had a disruptive effect on its enterprise information systems, which were found unable...

Examining Internet use among employees, this research investigated the theoretical proposition that personal IT innovativeness will positively impact the use of novel computer technologies. The research model included the individual traits of age, gender, experience with IT, and educational level. The...

This paper asks how people can be assisted in learning from practice, as a basis for informing future action, when configuring information technology (IT) in organizations. It discusses the use of Alexanderian Patterns as a means of aiding such learning. Three patterns are presented that have been...

Fluency with information technology (IT), defined as “an ability [to use information technology] to express [oneself] creatively, to reformulate knowledge and to synthesize new information,” (Committee on Information Technology Literacy, 1999, p. ES-1), is an important concern for those who manage...

The technology acceptance model (TAM) stipulates that both perceived ease of use (PEOU) and perceived usefulness (PU) directly influence the end user’s behavioral intention (BI) to accept a technology. Studies have found that self-efficacy is an important determinant of PEOU. However, there has been no...

Commercialized business application software packages have been widely used to implement business information systems. In order to determine whether a software package meets the system needs, consumers must check the software specifications against the target system requirements. Since the commercial...

Our research objectives are to provide a theoretical discussion on how software may impact user performance in ways contrary to designers’ intentions and users’ desires, and to empirically evaluate user performance impacts that derive from ostensibly performance-enhancing software features. We propose...

Many companies recently have been choosing information technology (IT) outsourcing in response to complicated information systems and various internal requirements. In order to monitor and maintain a high quality of IT outsourcing vendors’ services, it is necessary to develop a system to evaluate IT...

The growth of Internet shopping motivates a better understanding of how e-loyalty is built online between businesses and consumers. In this study, Web site design and culture are advanced as important to Web site trust, Web site satisfaction, and e-loyalty in online business relationships. Based on...

The Internet-enabled e-commerce field provides capabilities for firms in all sectors to reach global buyers and suppliers. Knowledge management provides frameworks to manage intellectual capital as a valuable organizational and strategic resource. Current literature on e-commerce and knowledge...

This study examines the applicability of the Thong, Yap, and Raman (1996) model of information systems (IS) effectiveness tested among Singaporean small businesses in a Canadian context. The model evaluates the importance of managerial support and external expertise (vendors and consultants) for IS...

It seems surprising that small firms engage in offshore outsourcing given that they lack the resources that large firms possess to overcome the difficulties involved. We examine these factors using transaction cost theory’s three stages: contact costs, contract costs, and control costs. Then, using our...

SMEs (small- to medium-sized enterprises) in the manufacturing industry are impacted by enormous changes in their business processes. E-commerce-related developments have reduced the importance of physical branches and moved it toward more sophisticated and e-commerce-enabled supply chains for products...

Despite the proclaimed advantages of small business strategic alliances, little research has been carried out to determine whether these structures “cushion” the disadvantages arising from e-commerce adoption for member businesses. There has also been a lack of research into comparing e-commerce use in...

This paper develops a research model of the importance of consumers’ perceived risk and the Internet shopping experience in the online purchasing behavior of Internet users. The model was tested using a survey of some 700 New Zealand Internet users. Both the perceived risk and perceived benefits of...

The study of factors influencing the adoption and use of information systems in less-developed countries is an important area to address since differences in culture, social structure, and business approaches may have significant effects on the benefits derived from importing Western-influenced IT...

Businesses that are involved in offshore software development often operate in a virtual project environment in which peer teams located at customer premise exchange project specifications with the offshore software development facility. To understand the complex issues in such a virtual project...

In an organizational setting, national culture is not the only type of culture that influences managerial and work behavior. Rather, behavior is influenced by different levels of culture ranging from the supranational (regional, ethnic, religious, linguistic) level through the national, professional...

This article is concerned with the pursuit of radical organizational transformation in information age government. It focuses on three cases, each of which used the SPRINT (Salford Process Reengineering Involving New Technology) process reengineering method. This method was designed specifically for...